Analysis
-
max time kernel
151s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 18:55
Behavioral task
behavioral1
Sample
dbd4d5ed634f3af104626b032a5e73c2054f86b3d2b9d940c0cc2f3d4ccaa473.dll
Resource
win7-20221111-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
dbd4d5ed634f3af104626b032a5e73c2054f86b3d2b9d940c0cc2f3d4ccaa473.dll
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
dbd4d5ed634f3af104626b032a5e73c2054f86b3d2b9d940c0cc2f3d4ccaa473.dll
-
Size
20KB
-
MD5
2759321cf89739ee00e69a821bab4455
-
SHA1
c744ba8f50c444a370ba749a1b052bc6176a0608
-
SHA256
dbd4d5ed634f3af104626b032a5e73c2054f86b3d2b9d940c0cc2f3d4ccaa473
-
SHA512
629006dde7eabf3afb5c58254a1033a26eb1394a5cc07a799e9bdb68e4bebc879e49ec9bfe406b86d4e52de42e3a7e1a8d6b354f9dc1786335f3192c489cebd9
-
SSDEEP
384:WpuOBcwPkjakZJMp1NbVIcUPOfcqhJ8yqF5KdeXmhRS3Ya2KFA/u56VPNR:SBcOJk3wI6fthJ8jwdymLCYZBR
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{HKMLO03-II-DF45D-2FDFDG} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{HKMLO03-II-DF45D-2FDFDG}\StubPath = "C:\\Windows\\system32\\mscidaemon.com" rundll32.exe -
resource yara_rule behavioral2/memory/2032-133-0x0000000010000000-0x0000000010026000-memory.dmp upx behavioral2/memory/2032-134-0x0000000010000000-0x0000000010026000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2032 3012 rundll32.exe 78 PID 3012 wrote to memory of 2032 3012 rundll32.exe 78 PID 3012 wrote to memory of 2032 3012 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbd4d5ed634f3af104626b032a5e73c2054f86b3d2b9d940c0cc2f3d4ccaa473.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbd4d5ed634f3af104626b032a5e73c2054f86b3d2b9d940c0cc2f3d4ccaa473.dll,#12⤵
- Modifies Installed Components in the registry
PID:2032
-